BOTNETS
GRAD SEC
NOV 21 2017
BOTNETS GRAD SEC NOV 21 2017 TODAYS PAPERS BOTNETS Collection of - - PowerPoint PPT Presentation
BOTNETS GRAD SEC NOV 21 2017 TODAYS PAPERS BOTNETS Collection of compromised machines (bots) under unified control of an attacker (botmaster) Method of compromise decoupled from method of control Launch a worm/virus, etc.:
NOV 21 2017
under unified control of an attacker (botmaster)
method of control
payload is orthogonal!
to rendezvous with botnet “command-and- control” (C&C)
commands and updates
under unified control of an attacker (botmaster)
method of control
payload is orthogonal!
to rendezvous with botnet “command-and- control” (C&C)
commands and updates
under unified control of an attacker (botmaster)
method of control
payload is orthogonal!
to rendezvous with botnet “command-and- control” (C&C)
commands and updates
C&C
under unified control of an attacker (botmaster)
method of control
payload is orthogonal!
to rendezvous with botnet “command-and- control” (C&C)
commands and updates
C&C
under unified control of an attacker (botmaster)
method of control
payload is orthogonal!
to rendezvous with botnet “command-and- control” (C&C)
commands and updates
C&C
Topology can be star (like this), hierarchical, peer-to-peer…
How do these bots know where to go? Issue DNS lookups for a known hostname Provides a level of indirection: Bots know the name ahead of time, but the botmaster can move the C&C node to different IP addresses, as needed Problem: Network operators will simply firewall a known-malicious domain name Domain fluxing: Generate random domain names. Move on by the time you’re found
Domain fluxing: Generate random domain names. Move on by the time you’re found (This) Botnet takeover: Anticipate the domain names; register those not yet purchased
Domain fluxing: Generate random domain names. Move on by the time you’re found (This) Botnet takeover: Anticipate the domain names; register those not yet purchased Keep in touch with bots, but never send a new config file Worked with ISPs and law enforcement to take them down
ETHICAL CONCERN: DO NO HARM
70GB over 10 days
NAT boxes: Small set of public IP addresses (typically one), Large set of private IP addresses (many) Carrier-grade NATs (CGNATS): NATs at a regional/national level A single host can have a different IP address for each connection “The trouble with Tor” Tor exit nodes also NAT Destinations cannot (based on IP addr)distinguish between the exit node’s traffic and Tor clients’ traffic Cloudflare shows Tor users captchas to differentiate